Displaying 6 results from an estimated 6 matches for "fatal_remove_all_cleanups".
2003 Jan 10
0
Core dump from sshd fatal_cleanup()
Hi All.
While working on something I noticed core dumps from sshd. They don't
seem to be related to what I was working on.
It's from the process forked to run the shell. Just after the fork,
fatal_remove_all_cleanups() is called, which looks like:
fatal_remove_all_cleanups(void)
{
struct fatal_cleanup *cu, *next_cu;
for (cu = fatal_cleanups; cu; cu = next_cu) {
next_cu = cu->next;
xfree(cu);
}
}
It runs through free'ing the structs, but it leave...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...t login_grace_time; /* Disconnect if no auth in this time
* (sec). */
diff -urN openssh-3.5p1-orig/session.c openssh-3.5p1/session.c
--- openssh-3.5p1-orig/session.c 2002-12-18 10:10:13.000000000 -0500
+++ openssh-3.5p1/session.c 2002-12-18 10:42:37.000000000 -0500
@@ -466,7 +466,7 @@
fatal_remove_all_cleanups();
/* Child. Reinitialize the log since the pid has changed. */
- log_init(__progname, options.log_level, options.log_facility, log_stderr);
+ log_init(__progname, options.log_level, options.log_facility, log_stderr,NULL);
/*
* Create a new session and process group since the 4.4BS...
2002 Oct 13
1
[PATCH] AIX password expiration
...ble");
#endif /* USE_PAM */
+#ifdef WITH_AIXAUTHENTICATE
+ if (is_aix_password_change_required())
+ packet_disconnect("Password change required but no "
+ "TTY available");
+#endif /* WITH_AIXAUTHENTICATE */
+
/* Fork the child. */
if ((pid = fork()) == 0) {
fatal_remove_all_cleanups();
@@ -757,6 +766,13 @@
}
#endif
+#ifdef WITH_AIXAUTHENTICATE
+ if (is_aix_password_change_required()) {
+ printf("%s\n", aixexpiremsg);
+ do_aix_change_password(pw);
+ }
+#endif
+
if (check_quietlogin(s, command))
return;
@@ -764,7 +780,10 @@
if (!is_pam_password_change_r...
2003 Jan 27
0
[Bug 375] sshd core dumping with msg "Cannot delete credentials"
...dtucker at zip.com.au 2003-01-27 11:39 -------
Assuming it's the fatal_cleanup() thing (there's no information to disprove this
and it certainly looks like it), this is now fixed.
20030114
- markus at cvs.openbsd.org 2003/01/11 18:29:43
[log.c]
set fatal_cleanups to NULL in fatal_remove_all_cleanups();
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
2003 Oct 08
4
OS/390 openssh
...strupper(upper, NULL);
+ if ((pid = ufork(upper)) == -1 && errno == EPERM) {
+ log("Hint: Is the POSIX-RLOGIN-DEFAULT set for user %s ?",
+ s->pw->pw_name);
+ }
+ free(upper);
+ }
+ if (pid == 0) {
+#else
if ((pid = fork()) == 0) {
+#endif
fatal_remove_all_cleanups();
/* Child. Reinitialize the log since the pid has changed. */
@@ -530,7 +545,22 @@
#endif
/* Fork the child. */
+#if #system(bs2000)
+ {
+ char *upper;
+ /* BS2000(PSD/POSIX) ufork needs the user name in UPPER case */
+ upper = xstrdup(s->pw->pw_name);
+ strupper(...
2003 Aug 10
9
updated gssapi diff
...def GSSAPI
+#include "ssh-gss.h"
+#endif
+
/* func */
Session *session_new(void);
@@ -409,6 +413,12 @@
session_proctitle(s);
+#ifdef GSSAPI
+ temporarily_use_uid(s->pw);
+ ssh_gssapi_storecreds();
+ restore_uid();
+#endif
+
/* Fork the child. */
if ((pid = fork()) == 0) {
fatal_remove_all_cleanups();
@@ -517,6 +527,12 @@
ptyfd = s->ptyfd;
ttyfd = s->ttyfd;
+#ifdef GSSAPI
+ temporarily_use_uid(s->pw);
+ ssh_gssapi_storecreds();
+ restore_uid();
+#endif
+
/* Fork the child. */
if ((pid = fork()) == 0) {
fatal_remove_all_cleanups();
@@ -703,7 +719,7 @@
* Sets the value of...